Cf 6.3.4.2. Certificate Verify with 6.3.5.1.  New Session Ticket Message

and we see that client certificate verification is allowed for some
PSK exchanges and not others, and that the PSK exchanges used in
resumption are ones where it is allowed. (Maybe I am reading that
wrong) Right now this feels footgunny to me: you have to track where
the PSK came from to decide if client auth is allowed.

I'd like to see an explicit separation by indicating where the PSK
came from in the ciphersuite, and then implementations reject
authentication with one of them. This way someone who wants to do the
wrong thing is at least forced through enough contortions they will
notice, rather than seeing two features that seem to work together but
don't.

TRON is in 2 days, and I'm concerned that the degree of analysis of
TLS 1.3 is far below where I would like to see with the timelines some
people are pushing for. I think it's clear that TLS 1.3
implementations will never be as secure and as simple as QUIC or
CurveCP. At the same time we've diverged from TLS 1.2 enough that
implementations will be significantly complicated when supporting
both, the reason given for not massively simplifying the protocol in
the first place.

Sincerely,
Watson

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to